Publications

Research publications by the faculty members:

Prof.S.Sameen fatima

  1. Dr. S Padmaja, Prof. S Sameen Fatima, Mr. Sasidhar Bandu, “Textual Analysis of Big Data with Object Knowledge Model: A Knowledge Representation framework”, Visleshana, Vol. 2 No. 2, January - March 2018.
  2. Dr. Padmaja S, Prof. Sameen Fatima S, Sasidhar B, “Associating News Articles to Identify the Scope of Negation and Sentiments of Public Opinion”, EECCMC, 28-29 Jan 2018.
  3. Dr. Sridevi tumula, Prof. S. Sameen Fatima, “Probabilistic Graphical Models for Medical Image Mining Challenges of New Generation”, Knowledge Computing and its Applications, ISBN: 978-981-10-8258-0, 2018.
  4. Firdous Hussaini, Padmaja S and S. Sameen Fatima, “Score-based Sentiment Analysis of Book Reviews in Hindi Language”, 3-4 Nov, regICON 2017.
  5. Smita, Prof. S Sameen Fatima, “Topical and Trust Based Page Ranking Using Automatic Seed Selection”, IEEE 7th International Advanced Computing Conference (IACC 2017), 5-7, Jan 2017.
  6. D. Fatima, Prof. Sameen Fatima, Dr. A. V. Krishna Prasad “Integrating weka into Web Application: Predicting Student's Performance”, International Journal of Engineering Research and Applications, vol 2 Issue 12, December 2017.
  7. R Krishnan, S Sameen Fatima, authored a chapter titled “Future of Artificial Intelligence” in the Book titled “Insights on Global Challenges and Opportunities for the Century Ahead”, B S Publications, 2017.
  8. Dr. S Padmaja, Prof. S Sameen Fatima, B Sasidhar, Vaibhav S L, “Extracting greater semantics from texts with Object Knowledge Model”, IEEE International Conference on Innovative Technologies in Engineering 2018, 11-13 April 2018.
  9. S Padmaja, Prof. S Sameen Fatima, “Extracting Voter Sentiment for Indian General Election Forecast Using NLP Techniques”, ICON 2016 Workshop, IIT – BHU, Varnasi, 17 th December 2016.
  10. Ayesha Banu, Syeda Sameen Fatima, Khaleel Ur Rahman Khan, “Information Content Based Semantic Similarity Measure for Concepts Subsumed by Multiple Concepts”, International journal web Applications, Sept 2015, volume 7, Number 3, pg 85-94.
  11. Badr Mohammed, S. Sameen Fatima, “Using Skipgrams, Bigrams, and Part of Speech Features for Sentiment Classification of Twitter Messages”,International Conference on Natural Language Processing (ICON)-2015, pg 1-8.
  12. Padmaja, S Sameen Fatima, SasidharBandu, “Comparing and Evaluating the Sentiment on Newspaper Articles: A Preliminary Experiment”, Science and Information Conference 2014, London, UK.
  13. S Padmaja, Prof. S Sameen Fatima, Sasidhar Bandu, “Comparing and evaluating the sentiment on newspaper articles: A preliminary experiment”, IEEE CONFERENCE PUBLICATIONS, Science and Information Conference (SAI), 2014, London, UK, on DOI: 10.1109/SAI.2014.6918276, ISBN: 978-0-9893-1933-1, pages: 789 – 792, date – August 29,  2014.
  14. S Padmaja, Prof. S Sameen Fatima, Sasidhar Bandu, B Sowmya, “Comparison of the Scope of Negation in Online News Articles”, IEEE Conference Publications, INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (ICCCT- 2014), 11-13 December 2014, Hyderabad.
  15. S Padmaja, Prof. S Sameen Fatima, Sasidhar Bandu, “Evaluating Sentiment Analysis Methods and Identifying Scope of Negation in Newspaper Articles”, International Journal of Advanced Research in Artificial Intelligence, (IJARAI), The Science and Information (SAI) Organization,  Pg. 1-6,Volume 3 Issue 11 November 2014.

 

Prof.  S. Ramachandram

  1. PS Kumar, S Ramachandram, “Fuzzy-Based Integration of Security and Trust in Distributed Computing” Soft Computing for Problem Solving, 899-912, 2019
  2. Harsoor, Bharati and Ramachandram, S “Single Phase Reliable Timeout Based Commit Protocol”, GSTF Journal on Computing (JOC), volume={1}, number={4}, 2018.
  3. Mallaiah, Kurra and Pande, Prateek and Ramachandram, S “A novel proximity based searchable encryption scheme using referential dissimilarity”, International Conference on Inventive Systems and Control (ICISC), 2017.
  4. Srivani, P., Ramachandram, S. and Sridevi, R., “A survey on client side and server side approaches to secure web applications”, International conference of Electronics, Communication and Aerospace Technology (ICECA), 2017.
  5. S Pelluri, R Sirandas - Energy Saving in Cloud by Using Enhanced Instance Based Learning (EIBL) for Resource Prediction - Sustainable Cloud and Energy Services, 2018
  6. P Srivani, S Ramachandram, R Sridevi- Experminetal Results On Multi-Key Searchable Encryption Technique With Different Elliptic Curves and APP Designing.- Journal of Theoretical & Applied Information Technology, 2017
  7. GM Kumar, S Ramachandram, J Gyani - Parameterized Reliable Trust Model in Grid Computing using Regression - International Journal of Advanced Research in Computer Science, 2017
  8. Srinivasa Reddy, K. and Ramachandram, S. (in press) “Cryptographic key management scheme for supporting multi-user SQL queries over encrypted databases”, International Journal of Computer Aided Engineering and Technology, 2018.
  9. Govardhana  Rao Inampudi, Kurra Mallaiah and  S. Ramachandram “ A Security Frame Work for Protecting Confidentiality of Medical Data hosted in an Un-Trusted Service Environment” at IEEE International Conference on Innovative Technologies in Engineering, Hyderabad,   11-13th April, 2018.
  10. Swetha Nagendla,  Govardhana  Rao Inampudi and S. Ramachandram “ Supporting Multiplication Operation using ElGamal Algorithm on Encrypted Data” IEEE International Conference on Inventive Computing and Informatics (ICICI) Nov, 2017
  11. Swetha Nagendla,  Govardhana  Rao Inampudi and S. Ramachandram “ Supporting Subtraction Operation using Residue Number Systems on Encrypted Data” IEEE International Conference on Recent Advances in Engineering and Technology(ICRAET), Dec- 2017.
  12. Kurra Mallaiah, S Ramachandram, Rishi kumar Gandhi, “Word and Phrase Proximity Searchable Encryption Protocols for Cloud Based Relational Databases”, ACM International Conference on Internet of things and Cloud Computing, 2016, United Kingdom.
  13. Kurra Mallaiah, S Ramachandram “Outsourcing of data but not Control: A novel approach for protection of outsourced organizational sensitive data in un-trusted service environment”, Journal of Defence Spectrum, DRDO, New Delhi.
  14. Srinivasa Reddy, K. and Ramachandram, S. (in press) “A Secure, Fast Insert and Efficient Search Order Preserving Encryption Scheme for Outsourced Databases”, International Journal of Advanced Intelligence Paradigms, 2016.
  15. Kurra Mallaiah, S Ramachandram, “A Stateless Key Management Technique for Protection of Sensitive Data at Proxy Level for SQL Based Databases Using NIST Recommended SP800-132”, International Conference on Applied Physics, Simulation and Computers, Vienna, Austria, 2015.
  16. Kurra Mallaiah, S Ramachandram, Rishi kumar Gandhi, “ Multi User Searchable Encryption Schemes using Trusted Proxy for Cloud based Relational Databases”, IEEE International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, Greater Noida, India.
  17. Nagaraju, S. Ramachandram, “Reduce redundant broadcasting in MANETs using rough sets,” International Journal of Wireless and Mobile Computing (IJWMC), vol. 7, no. 2, pp. 103-122, 2014.
  18. Swetha Tera, S. Ramachandram, and P. Shankar Murthy “Computational Analysis of Encrypted Database to Provide Confidentiality,” International Journal of Computer Theory and Engineering, Vol. 7, No. 2, April 2015,pp.108-112.

Prof.K.Shyamala

  1. Mrs.Humera Shaziya , Prof.K.Shyamala and Raniah Zaheer, “ Design and  Implementation of ConvNet for Handwritten Digits Classification on Graphical Processing Unit” International Conference on Communication and Signal Processing, April 3-5, 2018, INDIA
  2. Mrs.Humera Shaziya, Prof.K.Shyamala and Raniah Zaheer, “ Automatic Lung  Segmentation on Thoracic CT Scans Using U-Net Convolution Network” International Conference on Communication and Signal Processing, April 3-5, 2018, INDI
  3. Govardhana  Rao Inampudi; K. Shyamala; S. Ramachandram, “Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs” 2018 2nd IEEE International Conference on Inventive Systems  and Control (ICISC) Year: 2018 Pages: 984 - 988
  4. Raj Kiran  and  Prof.K.Shyamala  presented  a  Paper “ Design  and Implementation  of  GPU-based  Matrix  Chain  Multiplication  Using C++AMP", IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 22-24 Feb’2017.
  5. K.Shyamala, Raj Kiran and Rajeshwari, "Design and Implementation of GPU-based Matrix Chain Multiplication Using C++AMP", IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 22-24 Feb, 2017.
  6. Shyamala Kattula and Mallesham Dasari, “ On the Adaptive Motion Estimation in Video Coding, based on Video Content Analysis”, IEEE International Conference on “ Advances in Computing, Communications and Informatics” (ICACCI)-2016
  7. P. Vijaya Vardhan Reddy, K. Shyamala, “New scoring formula to rank hypervisors’ performance complementing with statistical analysis using DOE”, ELSEVIER’s Future Generation Computer Systems (FGCS), vol. 61, pp.54-65, 2016.
  8. P. Vijaya Vardhan Reddy, K.Shyamala, and A. Venugopal Reddy. “Optimization of Hypervisors Performance Using DOE”, AICIT’s Journal of Next Generation Information Technology (JNIT), vol. 6, no. 4, pp.63-74, 2015.
  9. Ravi Babu P, Shyamala K, Srinivasa Rao K ,“ Monte Carlo Simulation on GPGPU using Prefix Computation Method”, IEEE International Conference on Electrical, Computer and Communication Technologies,2015.
  10. Ravi Babu P, Shyamala K, Srinivasa Rao K “Monte Carlo Simulation on GPGPU
    using Prefix Computation Method”
    IEEE International Conference on Electrical, Computer and Communication Technologies, 5-7 March 2015
  11. Shyamala K  and V Kamakoti “ReMap: A Novel peephole optimization technique for LUT-based FPGAs” International Journal of Low power Electronics, Vol 10, No.1, pp 20-31,  March 2014 

Prof. P. Premchand

  1. BS Rao, P Premchand, “Design and Implementation of a Hacker Detection Scheme: A Network Security Measure in Heterogeneous WSN” Innovations in Computer Science and Engineering, 503-511, 2019.
  2. BS Rao, P Premchand, “A Secure and Computational-Efficient Multicast Key Distribution for Wireless Networks” Cognitive Informatics and Soft Computing, 91-101, 2019.
  3. “Designing Code level Reusable Software Components”, International Journal of Software Engineering and Applications, Jan 2012.
  4. “Cryptanalysis of Authenticated Key Exchange 3P-EKE Protocol and Its Enhancement”, IEEE International Conference on Advances in Engineering, Science and Management, 2012.
  5. BS Rao, P Premchand, “A Review on Combined Attacks on Security Systems”, International Journal of Applied Engineering Research 13 (23), 16252-16278, 2018.
  6. BS Rao, P Premchand, “Evaluation of Differential–Linear Cryptanalysis Combined Attack on Cryptographic Security System” International Journal of Applied Engineering Research 13 (23), 16552-16563, 2018.
  7. BS Rao, P Premchand, “Anomalous Attacker Evidence and Detection System in WSN” International Journal of Applied Engineering Research 13 (19), 14313-14322, 2018.
  8. BS Rao, P Premchand,“Cryptographic Tamper Evidence and Detection System” International Journal of Pure and Applied Mathematics 118 (16), 199-211, 2018
  9. B Jalender, A Govardhan, P Premchand, “Automation of component selection process for designing of reusable components using drag and drop mechanism” International Conference on Inventive Systems and Control (ICISC), 1-5, 2017.
  10. RVSK Dutt, P Premchand, “Generative Adversarial Networks (GAN) Review” CVR Journal of Science and Technology 13, 1-5, 2017.
  11. BS Rao, P Premchand, “Attacker Evidence System in WSN” International Conference on Computing, Analytics and Networks, 166-178, 2017
  12. A Raghuvamshi, P Parvataneni “Design of a Robust, Computation-Efficient and Secure 3P-EKE Protocol using Analogous Message Transmission” International Journal of Computer Network and Information Security 8 (5), 9, 2016.
  13. A Raghuvamshi, P Parvataneni, “Verifier-based Password Authenticated 3P-EKE Protocol using PCLA Keys” International Journal of Computer Network and Information Security 8 (6), 59, 2016.
  14. C Vidyadhari, N Sandhya, P Premchand, “Particle Grey Wolf Optimizer (PGWO) algorithm and semantic word processing for automatic text clustering” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2016.
  15. P Swetha, P Premchand, “Secret Key Sharing Using Homomorphic Commitments and its application to Threshold Cryptography” International Journal of Applied Engineering Research 11 (9), 6598-6602, 2016

L. K. Suresh Kumar

  1. Mr.L.K.Suresh Kumar has presented  a IEEE paper entitled “Localized   Encryption and Authentication   Protocol (LEAP) to Prevent Injection of Malicious Nodes in a Wireless Sensor Network (WSN)” at
    Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi
    12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development 
    on 14 – 16th March, 2018
  2. Mr.L.K.Suresh Kumar  has presented  a IEEE paper entitled “Credit Card Fraud Prevention for Financial Institutions : Use of Anomaly Detection Method” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018
  3. Mr.L.K.Suresh Kumar has presented a paper entitled “Comparative Study  of Cluster Based Data Aggregation Protocols” at International Conference on Trends in Engineering, Management, Pharmacy & Sciences  (ICTEMPS-2018) on 21st April, 2018, GCET, Cheeryala(V), Keesara (M), Hyderabad.
  4. Mr.L.K.Suresh Kumar has presented a IFERP paper entitled “A Survey on Algorithms Solving ECDLP (Elliptic Curve Discrete Log Problem)” at International Conference on Internet of Things for Future Smart Cities (ICIOTSC-2017) organized by GIST&IERP on 21st – 22nd July, 2017, Nellore
  5. Mr.L.K.Suresh Kumar has presented  a IEEE paper entitled “Comparative Study of LEACH and EECDA Protocols” at International Conference on Power, Control, Signals & Instrumentation Engineering  (ICPCSI) - 2017 organized by Saveetha Engineering College, Thandalam, Chennai, Tamil Nadu, India on 21st – 22nd September, 2017
  6. Mr.L.K.Suresh Kumar has presented  a IEEE paper entitled “Localized   Encryption and Authentication Protocol (LEAP) to Prevent Injection of Malicious Nodes in a Wireless Sensor Network (WSN)” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018
  7. Mr.L.K.Suresh Kumar  has presented  a IEEE paper entitled “Credit Card Fraud Prevention for Financial Institutions : Use of Anomaly Detection Method” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018
  8.  Mr.L.K.Suresh Kumar has presented a paper entitled “Comparative Study of Cluster Based Data Aggregation Protocols” at International Conference on Trends in Engineering, Management, Pharmacy & Sciences  (ICTEMPS-2018) on 21st April, 2018, GCET, Cheeryala(V), Keesara (M), Hyderabad.
  9. Mr.L.K.Suresh Kumar, “Multi-Keyed algorithm of Elliptic Curve Cryptography” 5th National Conference on Computer Networks & Information Security (NCCNIS), 2016.
  10. Mr.L.K.Suresh Kumar “A Survey on Homomorphic Encryption Schemes in WSN” 5th National Conference on Computer Networks & Information Security (NCCNIS – 2016), 2016.
  11. Mr.L.K.Suresh Kumar,  “Detailed study of MAC Based and Level Based Routing  Protocol in Wireless Sensor Networks”,  5th  National Conference  on  Computer Networks & Information Security (NCCNIS)  2016.
  12. Mr.L.K.Suresh Kumar, “ A Survey on Intrusion Detection Techniques in Wireless Sensor Networks”  National Conference on  Computer Networks & Information Security (NCCNIS), 2016.

Dr. P V Sudha

  1. Sudha Pelluri , Ramachandram SirandasChapter Title-- "Energy efficient Resource Prediction for Cloud" Publisher - Springer International Publishing AG ,  Editor-- Wilson Rivera, University of Puerto Rico at Mayaguez . Book Title --" Sustainable Cloud and Energy Services: Principles and Practice "
  2. Dr P V Sudha authored a chapter titled “Energy Saving in Cloud by Using Enhanced Instance Based Learning (EIBL) for Resource Prediction”  in the book titled " Sustainable Cloud and Energy Services: Principles and Practice " Springer International Publishers, 2016.
  3. Dr. P V Sudha “Resource Requirements in Cloud environments” International Conference on Emerging Trends in Engineering, Science & technologi3es, ICETEST, March 2017.
  4. Dr. P V Sudha, “Energy Optimization at Cloud Data Centre Using SDN” IJETT- Special Issue, Vol.2, April 2017. Pg.278 – pg. 283 I.F-2.88

Mrs B. Sujatha

  1. Dr. B. Sujatha, “Understanding agile software development process using model-based    design   in   project   development”,   IEEE   International Conference on Innovative Technologies in Engineering 2018 (ICITE OU)
  2. Dr. B. Sujatha, “Automization of  Object  Oriented Design Using  Back  Propagation  Neural  Network for Better Maintainability of  Software ”, International journal of  intelligent engineering  and   systems  (INASS),  Http://www.inass.org/, March 1, 2018.
  3.  B.Sujatha, “Energy efficient data route-in-network aggregation with secure EEDRINA”, Springer International Conference on Computational Intelligent and Data Engineering, July,2017.
  4. B. Sujatha,  “ Natural Language Query Parser using first Order Logic for Querying Relational Databases”, International Journal of Computer Applications, (0975-8887) volume 134-No.11, January 2016.
  5. B. Sujatha, “Ontology Based Natural Language Interface for Relational Databases”, International Conference on Intelligent Computing, Communication and  Convergence (ICCC), 2016.
  6. B. Sujatha, “ A Generic model for Natural Language Interface To Database”, 6th IEEE International Advanced Computing Conference (IACC), 2016.
  7. B. Sujatha,  “ Natural Language Query Processing for Relational Database using EFFCN Algorithm”, IJCSE (International Journal of Computer Science and Engineering), vol.4, Issue- 02, F eb-2016.

          
Mrs. V. Sukanya

  1. E. Vishnu Priya Reddy, V.Sukanya, Abhinava Vinay Kumar M, Anil Kumar M “A Study on effective approach of Science Teaching by IOT Smart Classroom” International Journal of Research Culture Society Volume 2, Issue 3, March-2018.
  2. E. Vishnu Priya Reddy, V.Sukanya, Abhinava Vinay Kumar M, Anil Kumar M “A Study on Expandable latest software feature in bundling of latest hardware with earlier software” International Journal of  Scientific Research in Science and Technology Volume 4, Issue 5, March-2018.
  3. Mrs.V.Sukanya,  “Performance Optimization of Web Services using Data Mining Techniques”, National  Conference on “Information Security” at CBIT, Hyderabad ,  2015.

Mrs A. Gayatri

  1. A. Gayatri, “Implementation of AES Algorithm for Area and Power Optimization by the Application of Reversible Logic and Null  Conventional Logic”, International Journal of Emerging Engineering Research and Technology ,  Volume 3, Issue 7,  2015.

 

(Updated On 01-06-2019, 03:00 PM)